default search action
Kun Meng
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]Kun Meng, Xianyong Dong, Hongyuan Shan, Shuyin Xia:
Multiscale hierarchical attention fusion network for edge detection. Int. J. Ad Hoc Ubiquitous Comput. 42(1): 1-11 (2023) - [c23]Kun Meng, Lijun Sun, Xiao Chen, Haiqin Wu, Shuaiyong Li:
A Decentralized Vehicle-to-Vehicle Energy Trading System Based on Efficient Sharding Services. ISPA/BDCloud/SocialCom/SustainCom 2023: 42-49 - 2022
- [c22]Yujia Tao, Kun Meng:
URL Based File Inclusion Attack Behavior Analysis and An Autoencoder Detection Model. ICCAI 2022: 252-258 - [c21]Kai Sun, Kun Meng, Ziqiang Zheng:
GAME-BC: A Graph Attention Model for Exploring Bitcoin Crime. ISCSIC 2022: 342-346 - 2020
- [j16]Kun Meng, Chunyi Cui, Haijiang Li:
An Ontology Framework for Pile Integrity Evaluation Based on Analytical Methodology. IEEE Access 8: 72158-72168 (2020) - [j15]Shuqin Li, Saisai Li, Hengyang Cao, Kun Meng, Meng Ding:
Study on the Strategy of Playing Doudizhu Game Based on Multirole Modeling. Complex. 2020: 1764594:1-1764594:9 (2020) - [c20]Xu Meng, Kun Meng, Wenbao Qiao:
A Survey of Research on Image Data Sources Forensics. AIPR 2020: 174-179
2010 – 2019
- 2019
- [c19]Lanyong Zhang, Kun Meng, Keqing Wang:
Research on Delay Prediction Compensation of Teleoperation Robot Network Control System. FSDM 2019: 106-115 - [c18]Peipei Wang, Kun Meng, Shuqin Li:
An Efficiency Evaluation Model for Designing Optimal Scheduling Mechanisms in N+X Hybrid Blockchain. ICACT 2019: 71-76 - 2018
- [j14]Chunyi Cui, Shiping Zhang, Kun Meng, Chengshun Xu, Gang Yang:
An analytical solution for integrity detection of a floating pile embedded in saturated viscoelastic half-space. Int. J. Distributed Sens. Networks 14(9) (2018) - [j13]Chunyi Cui, Kun Meng, Zhimeng Liang, Chengshun Xu, Gang Yang, Shiping Zhang:
Effect of radial homogeneity on low-strain integrity detection of a pipe pile in a viscoelastic soil layer. Int. J. Distributed Sens. Networks 14(10) (2018) - [c17]Lanyong Zhang, Kun Meng, Shuai Zhu:
Variable Universe Fuzzy Control of a High-Temperature Superconducting Machine Excitation System. FSDM 2018: 141-149 - [c16]Saisai Li, Shuqin Li, Meng Ding, Kun Meng:
Research on Fight the Landlords' Single Card Guessing Based on Deep Learning. ICANN (3) 2018: 363-372 - 2017
- [c15]Shuo Xu, Shuqin Li, Kun Meng, Lijun Wu, Meng Ding:
An Adaptive Malicious Domain Detection Mechanism with DNS Traffic. ICNCC 2017: 86-91 - 2016
- [j12]Shu Min Xing, Wen An Liu, Kun Meng:
Rényi-Berlekamp-Ulam searching game with bi-interval queries and two lies. Discret. Appl. Math. 202: 8-18 (2016) - [c14]Puheng Zhang, Chuang Lin, Kun Meng, Ying Chen:
A Comprehensive Optimization for Performance, Energy Efficiency, and Maintenance in Cloud Datacenters. Trustcom/BigDataSE/ISPA 2016: 1264-1271 - 2015
- [c13]Kun Xu, Chuang Lin, Zhen Chen, Kun Meng, Mourad Hakmaoui:
An Effective Policy Relocation Scheme for VM Migration in Software-Defined Networks. ICCCN 2015: 1-8 - 2014
- [j11]Ning Wang, Yang Yang, Liyuan Feng, Zhenqiang Mi, Kun Meng, Qing Ji:
SVM-Based Incremental Learning Algorithm for Large-Scale Data Stream in Cloud Computing. KSII Trans. Internet Inf. Syst. 8(10): 3378-3393 (2014) - [j10]Xiaoli Wang, Yuping Wang, Kun Meng:
Optimization Algorithm for Divisible Load Scheduling on Heterogeneous Star Networks. J. Softw. 9(7): 1757-1766 (2014) - [j9]Jie Hu, Kun Meng, Xiaomin Chen, Chuang Lin, Jiwei Huang:
Analysis of influence maximization in large-scale social networks. SIGMETRICS Perform. Evaluation Rev. 41(4): 78-81 (2014) - [c12]Xiaoli Wang, Yuping Wang, Kun Meng:
A New Genetic Algorithm for Release-Time Aware Divisible-Load Scheduling. CIS 2014: 134-138 - [c11]Wenbo Su, Chuang Lin, Kun Meng, Qu Liu:
Modeling and Analysis of Availability for SaaS Multi-tenant Architecture. SOSE 2014: 365-369 - [c10]Ning Wang, Yang Yang, Zhenqiang Mi, Qing Ji, Kun Meng:
A Fault-Tolerant Strategy of Redeploying the Lost Replicas in Cloud. SOSE 2014: 370-375 - 2013
- [j8]Kun Meng, Chuang Lin, Yang Yang:
Minimum number of queries for an adaptive liar search game with small sets. Discret. Optim. 10(4): 233-240 (2013) - [j7]Mingzhao Wang, Xiaoli Wang, Kun Meng, Yuping Wang:
New Model and Genetic Algorithm for Divisible Load Scheduling in Heterogeneous Distributed Systems. Int. J. Pattern Recognit. Artif. Intell. 27(7) (2013) - [j6]Yuanzhuo Wang, Jingyuan Li, Kun Meng, Chuang Lin, Xueqi Cheng:
Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets. Secur. Commun. Networks 6(1): 89-99 (2013) - [c9]Xiaoli Wang, Yuping Wang, Kun Meng:
An Energy-Aware Optimization Model Based on Data Placement and Task Scheduling. CIS 2013: 45-49 - [c8]Rui Zhang, Chuang Lin, Kun Meng, Lin Zhu:
A modeling reliability analysis technique for cloud storage system. ICCT 2013: 32-36 - [c7]Lin Zhu, Chuang Lin, Kun Meng, Xingyu Tang:
An experimental analysis of interference in 802.11n wireless mesh networks. ICCT 2013: 276-280 - [c6]Lin Zhu, Chuang Lin, Kun Meng, Yangwei Dong:
P-AODV: A protection routing mechanism in wireless mesh networks. ICCT 2013: 505-510 - [c5]Rui Zhang, Chuang Lin, Kun Meng, Lin Zhu:
BEC: A reliable and efficient mechanism for cloud storage service. ICCT 2013: 717-721 - 2012
- [j5]Kun Meng, Chuang Lin, Wen An Liu, Yang Yang, Gyula O. H. Katona:
Minimum average-case queries of q+1-ary search game with small sets. Discret. Appl. Math. 160(4-5): 618-627 (2012) - [j4]Yuanzhuo Wang, Min Yu, Jingyuan Li, Kun Meng, Chuang Lin, Xueqi Cheng:
Stochastic game net and applications in security analysis for enterprise network. Int. J. Inf. Sec. 11(1): 41-52 (2012) - 2011
- [j3]Kun Meng, Chuang Lin, Wen An Liu, Yang Yang:
Q-ary Rényi-Ulam pathological liar game with one lie. Discret. Appl. Math. 159(6): 478-483 (2011) - [c4]Jianxiong Wan, Chuang Lin, Xin Chen, Kun Meng:
On the Optimal Request Routing Strategy in CDN Live Streaming Application. ICC 2011: 1-5 - 2010
- [c3]Jianxiong Wan, Chuang Lin, Xin Chen, Kun Meng, Yuanzhuo Wang:
Performance Analysis of Channel Contention in Wireless Ad Hoc Networks: A Stochastic Game Nets Approach. GLOBECOM 2010: 1-5
2000 – 2009
- 2009
- [j2]Yuanzhuo Wang, Chuang Lin, Kun Meng, Junjie Lv:
Analysis of Attack Actions for E-Commerce Based on Stochastic Game Nets Model. J. Comput. 4(6): 461-468 (2009) - [c2]Yuanzhuo Wang, Chuang Lin, Kun Meng, Hongkun Yang, Junjie Lv:
Security Analysis for Online Banking System Using Hierarchical Stochastic Game Nets Model. GLOBECOM 2009: 1-6 - [c1]Yuanzhuo Wang, Chuang Lin, Yang Wang, Kun Meng:
Security Analysis of Enterprise Network Based on Stochastic Game Nets Model. ICC 2009: 1-5 - 2007
- [j1]Wen An Liu, Kun Meng, Shu Min Xing:
Q-ary search with one lie and bi-interval queries. Inf. Process. Lett. 103(2): 78-81 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint